General

  • Target

    5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5.exe

  • Size

    685KB

  • Sample

    241112-mgrt5atmgl

  • MD5

    1cdf67ab2f6877fc464f6b8dc3ebefa0

  • SHA1

    898e968c7adfece017d1918730bf7e2e63ccbc56

  • SHA256

    5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5

  • SHA512

    854ec7a036053210e75a4ace64e10317b9c05d5a77051c17254ea9371e9876843430a4815a15e126beca4ad288e79031f60121c82dec3380a1cdf850fcdaf413

  • SSDEEP

    12288:fgWVeEfxkEmbGq3rNV22td/HSLthAYLdG85KJDJVkA2/+L6N:4WVeEZNmN3P22X6RNyDJyA2WLs

Malware Config

Extracted

Family

snakekeylogger

C2

https://api.telegram.org/bot8142299351:AAFDTrtIpOoWWO5SiyZfI7QSQ2VJ59N65c8/sendMessage?chat_id=595808702

Targets

    • Target

      5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5.exe

    • Size

      685KB

    • MD5

      1cdf67ab2f6877fc464f6b8dc3ebefa0

    • SHA1

      898e968c7adfece017d1918730bf7e2e63ccbc56

    • SHA256

      5cc89125b7be333c0a136b8b72635421b779077e5a27657aae57a20f56fa4be5

    • SHA512

      854ec7a036053210e75a4ace64e10317b9c05d5a77051c17254ea9371e9876843430a4815a15e126beca4ad288e79031f60121c82dec3380a1cdf850fcdaf413

    • SSDEEP

      12288:fgWVeEfxkEmbGq3rNV22td/HSLthAYLdG85KJDJVkA2/+L6N:4WVeEZNmN3P22X6RNyDJyA2WLs

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks